Pinup: Pertino Brings Cloud Networks To Small Businesses

Computing hardware is expensive. No matter what type of virtual activities you are involved in, shelling out money for the hardware side of things has always been part of the process of getting things working successfully. Having powerful software is definitely a good thing; however, without the hardware to run it on, it is about as useful as a trapdoor on a lifeboat.

However, cloud-startup, Pertino, is set to change all of that.

Pertino was first launched in September of 2011 and is located in Los Gatos, CA. Pertino was founded by Craig Elliott, former Apple executive, Scott Hankins, former Director of Engineering at Blue Coat Systems, Andrew Mastracci, Architect and Michael Cartsonis, who has since left for employment with Contrast Security. Pertino has raised close to $30 million, from venture firms like Norwest Venture Partners and Lightspeed Venture Partners.

As Craig Elliott, CEO of Pertino Networks, puts it “The cloud and ‘as-a-service’ delivery models have transformed the IT landscape from a computing, storage and application perspective while, at the same time, the network paradigm has changed little. As a result, networks that once enabled businesses now constrain them when it comes to harnessing the disruptive capabilities and economies of the cloud. Pertino Networks was founded to radically simplify and alter the economics of business networks by bringing them into the cloud era.”

Pertino’s services are geared primarily towards smaller businesses that do not have the resources or manpower to develop and maintain the network they need with a hardware solution. Chief areas where this is seen are:

Connection

Pertino delivers fast, LAN-quality connections between all of the devices in your company. Not only are these connections completely hardware free, they also require no advanced configuration to set up. These connections are also fully equipped with 256-bit encryption, which ensures that all your data stays safe, no matter where it is stored.

Security

In addition to the aforementioned encryption, Pertino also includes several other layers of protection. One example of these layers is authentication at the device and user levels, which safeguards your network from access by unauthorized devices and people.

Optimize

Pertino uses only top-tier data centers, providing the same level of performance whether your employees are local or in another part of the world. Pertino also identifies where the accessing employee is and uses the closest data center to ensure no degradation of performance. Traffic itself is also optimized, which locks data into the shortest and clearest paths to and from the Pertino network.

Manage

Pertino’s cloud management console allows you complete access and control over your entire network, all in one easy-to-use location. No matter what type of activities you need to complete, such as update policies, manage users or just monitor performance, it can easily be performed by using the Pertino interface.

Having the capabilities of a powerful network is an excellent way for a small business to develop and grow their company in as short a time as possible. By using Pertino’s services, your company can enjoy the stellar growth possibilities all companies strive for.

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Real Driver For Digital Transformation Business owners and executives today know the power of social media, mobile technology, cloud computing, and analytics. If you pay attention, however, you will notice that truly mature and successful digital businesses do not jump at every new technological tool or platform. While they do not sit and wait…

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…